Trojan programs improve attack methods
Source: Vnunet
Security watchers have warned that Trojan programs, feared for their ability to compromise a network and go unnoticed, are getting sneakier about sending data out of the network. Typically, Trojans sit on a compromised machine and wait for incoming connections to deliver instructions.
But this leaves a flaw in the Trojan's functionality: all unnecessary ports can be blocked so that incoming connections are dropped and the Trojan is rendered useless.